Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
德胜钢铁
Monastic
Mystique
AvaxHome
completa
Bovary
Montessori
affection
Sutphen
教师
Furnaces
training
Collodi
Brutus
Seal
Disputes
Sprinkle
安泰集团神话
Sinden
Caldara
Symphonic
PlayBoy
Leela
goals
automata
Lernatlas
Paperbacks
Virgins
Heideggers
Businessweek
Rameau
Deviations
phenomena
PostgreSQL
APPDEV
ATOMIC
Hydrosystems
Greens
Reciprocal
Venus
Nice
Sofia
锡尔瓦多
EverFlight
Compressible
Americas
Algorithms
Hasn
Jigs
Alphabet
Newest
Internet/Networking Download Accelerator Plus 9.4.1.1
Internet/Networking TomTom v1.4.1 EuropeEast v.850.2800 Multilingual
Internet/Networking IncrediMail 2 6.14 Build 4676
Internet/Networking MetaProducts Offline Explorer Enterprise 5.9.3228 and (Portable)
Internet/Networking Internet Download Manager 6.0 Build 2 Beta
Internet/Networking HiDownload Platinum 7.90
Internet/Networking TVAnts 1.0.0.59 Build 0836 Multilanguage
Internet/Networking Platinum Hide IP 2.1.1.8 and (Portable)
Internet/Networking Full Speed's Pro Boost 3.3 Internet Booster
Internet/Networking All of WiFi Hack 2010! Step by step... So easy to use!
Internet/Networking Wireless Hacking Live (FBI Version 2011) Hot..Hot
Internet/Networking Download Accelerator Plus 9.4.0.5 Premium
Internet/Networking Proxy Switcher 4.2.0.5101 and (Portable)
Internet/Networking Internet Download Manager 6.0 Beta and (Portable)
Internet/Networking Sygic Mobile Maps Europe TeleAtlas (21.07.2010)
Internet/Networking MailWasher Pro 2010 1.0.4 (Portable)
Internet/Networking Super Hide IP 2.1.1.2
Internet/Networking YouTube Music Downloader 3.5.0.2
Internet/Networking AutoMapa 6.5.0 Build 1076 Includes Map Of Europe 1006
Internet/Networking HiDownload Platinum 7.89
Internet/Networking TomTom v1.4.1 EuropeEast v.850.2800 Multilingual
Internet/Networking IncrediMail 2 6.14 Build 4676
Internet/Networking MetaProducts Offline Explorer Enterprise 5.9.3228 and (Portable)
Internet/Networking Internet Download Manager 6.0 Build 2 Beta
Internet/Networking HiDownload Platinum 7.90
Internet/Networking TVAnts 1.0.0.59 Build 0836 Multilanguage
Internet/Networking Platinum Hide IP 2.1.1.8 and (Portable)
Internet/Networking Full Speed's Pro Boost 3.3 Internet Booster
Internet/Networking All of WiFi Hack 2010! Step by step... So easy to use!
Internet/Networking Wireless Hacking Live (FBI Version 2011) Hot..Hot
Internet/Networking Download Accelerator Plus 9.4.0.5 Premium
Internet/Networking Proxy Switcher 4.2.0.5101 and (Portable)
Internet/Networking Internet Download Manager 6.0 Beta and (Portable)
Internet/Networking Sygic Mobile Maps Europe TeleAtlas (21.07.2010)
Internet/Networking MailWasher Pro 2010 1.0.4 (Portable)
Internet/Networking Super Hide IP 2.1.1.2
Internet/Networking YouTube Music Downloader 3.5.0.2
Internet/Networking AutoMapa 6.5.0 Build 1076 Includes Map Of Europe 1006
Internet/Networking HiDownload Platinum 7.89
Useful Links
Internet/Networking Wireless Hacking Live - FBI version ISO
Posted on 2011-03-16
|
More Live Cd For Wireless Hacking, Also Used By The FBI This version is for all systems except systems with the Intel B/G wireless cards (IPW2200). - Live CD with all the tools you need to hack a WLAN / wireless Access point - Linux Live-CD - OS runs from CD - 635 mb - .iso - also used by the FBI. WEP Hacking - The Next Generation WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver. Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of ???strong??? encryption while a 128 bit key has 104. The IV is placed in encrypted frame???????s header, and is transmitted in plain text. Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packetsa????a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key. Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, ???It doesn???????t matter if you use 128 bit WEP keys, you are vulnerable!??? WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver. Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of ???strong??? encryption while a 128 bit key has 104. The IV is placed in encrypted frame???????s header, and is transmitted in plain text. Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key. Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. Basic Directions: 1)Boot from cd 2)get the wep key 3)write it down 4)reboot into windows 5)connect using wep key. Download Link Mirror
Rating:
2.5 out of 5 by Book123 |
Like this article?! Give us +1: